Zero Trust Flashcards
Zero Trust
Demanding of verification for every device, user, and transaction within the network, regardless of the origin
What are the 2 Planes in the Zero Trust Model?
Control Plane and Data Plane
Control Plane
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Elements involved in the Control Plane Include:
Adaptive Identity, Threat scope reduction, Policy-driven access control, and secured zones
Adaptive Identity
Relies on real-time validation that takes into account the user’s behavior, device, location, and more
Threat Scope Reduction
Limits the user’s access to only what they need for their work tasks because this reduces the network’s potential attack surrface
Point of Threat Scope Reduction
Focused on minimizing the “blast radius” that could occur in the event of a breach
Policy-Driven Access Control
Entails developing, managing, and enforcing user access policies based on their roles and responsibilitiesS
Secured Zones
Isolated environments within a network that are designed to house sensitive data
Data Plane
Ensures that policies are properly executed
Elements of the Data Plane
Subject/System, Policy Engine, Policy Administrator, Policy Enforcement Point